Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use.

Size: px
Start display at page:

Download "Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use."

Transcription

1 Provided for non-commercial research and education use. Not for reproduction, distribution or commercial use. ISBN This chapter was published in the above Springer book. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing with colleagues and providing to institution administration. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the chapter (e.g. in Word or TEX form) to their personal website or institutional repository.

2 Chapter 36 Quantum Cryptography for Information- Theoretic Security Quantum Cryptography Barry Sanders Abstract This article explains quantum computing and its potential for rendering current encrypted communication via public channels insecure. A review of quantum key distribution is given as a way to ensure secure public-channel communication regardless of the computational power of an adversary, that may possesses a quantum computer. Finally, state-of-the-art quantum key distribution is discussed with an insight into its future. Keywords Quantum computing Quantum key distribution Quantum cryptography Quantum communication Information security 36.1 Introduction For business and pleasure, we need to send secrets through public channels, whether by telephone, fax, telex or the internet. Let us consider the following example. Suppose you wish to make a payment via a web page using your credit card, but you want to ensure that your credit card details are safe from eavesdropping criminals. This criminal eavesdropper, whom we call Eve, could be powerful beyond your dreams, for example using devices and mathematics we do not yet imagine. Is our communication protected against such powerful adversaries? Here is one B. Sanders (*) Institute for Quantum Information Science, University of Calgary, 2500 University Drive N.W., Calgary, AB, Canada sandersb@ucalgary.ca A. Vaseashta et al. (eds.), Technological Innovations in Sensing and Detection of Chemical, Biological, Radiological, Nuclear Threats and Ecological Terrorism, NATO Science for Peace and Security Series A: Chemistry and Biology, DOI / _36, Springer Science+Business Media B.V

3 336 B. Sanders way that our communication is kept safe nowadays. Alice, who works for the company waiting for your payment, generates a pair of numbers expressed as strings of binary digits, or bits. She sends you one string, which is called the public key, and she keeps the other string for herself, which is called the private key. The message you plan to send, such as your credit card number, can also be expressed as a binary string. To send the message securely, you compute some function of both your message and Alice s public key, and then you send her the calculated result. This function is considered to be hard-to-crack without knowing the private key, inverting the function to reveal the message is believed to be beyond the capability of the eavesdropper s computers within a reasonable timeframe. When Alice receives the result of your computation, she uses her private key to decode the message from your result. Because Alice holds the corresponding private key, inverting the function to find the message, i.e. decoding, is easy for her. On the other hand, Eve knows the public key and the result but is unable to decode the message without having access to the private key. We are prepared to take the risk that Eve could crack the code when making financial transactions, but what about more important information? Could a national secret be transmitted safely via a public channel in this way? There are three reasons not to do so. One reason is that some secrets have to be secrets for a long time, maybe forever. For many years, the power of computers has improved exponentially so Eve could record the message and wait for a more powerful computer to be created that would make cracking the code easy. Another risk is that Eve is so smart she devises a way to invert the function in a way that we have not figured out yet: the difficulty of breaking these codes is not proven but rather just assumed, albeit with strong evidence supporting this assumption. The third reason to be wary with computationally-secure cryptography is the threat posed by a quantum computer: a scalable quantum computer, meaning a computer that can run quantum algorithms and can be made larger at a cost that grows only as a polynomial function of the computer s size, renders these coding functions easy-to-crack. Thus, computationally-secure cryptography can be regarded as secure against a non-quantum computer, subject to the provisos above, but insecure against a computer that exploits the full potential of quantum mechanics. The quantum computer could make today s methods of cryptography instantly unsafe and thereby threatens public-key cryptography. On the other hand, a technique known as quantum key distribution also uses quantum technology but for the purpose of creating a shared key that is intended to be unbreakable no matter what kind of computer Eve possesses or what algorithms she knows. In other words quantum cryptography, which uses quantum key distribution, is informationtheoretically secure it cannot be broken by computational attacks in contrast to today s bounded-computational security where Eve is believed to have limited computational capability.

4 36 Quantum Cryptography The Quantum Computing Threat What Is a Quantum Computer? Let us consider what defines a quantum computer [ 1 ] Defining the quantum computer is, in fact, rather subtle [ 2 ]. As we believe that quantum mechanics underpins all of science, then all computers are quantum, in the same sense that everything around us is quantum. Yet we are safe in regarding most things in the world as non-quantum so a better criterion is needed. We know that the Heisenberg uncertainty principle [ 3 ] and entanglement [4 ], which are two of the distinguishing features of quantum mechanics, are negligible in our macroscopic world. Therefore, we could think of a quantum computer as a computing machine that exhibits quantum properties whereas existing computers do not. The problem with this definition is that modern computers use transistors, and transistors operate on quantum principles. Perhaps the best definition of a quantum computer is as a computing machine that is described by quantum mechanics and can perform computations that a device built entirely out of non-quantum components could not do. This definition gets around the problem of a modern computer using a transistor: although we use transistors that operate on quantum principles, we could equally well build the computer out of billiard balls and achieve the same computational power, albeit more bulky, fragile and expensive. More technically, a quantum computer is a computing machine that can run any quantum algorithm What Will the Quantum Computer Look Like? In the early days of computers, logical elements were built from different media: vacuum tubes, germanium or silicon. Similarly, various quantum computer media are available, and we are figuring out which one is the best. One type of quantum computer technology uses light [ 5 ]. Light is quite versatile. Its degrees of freedom include polarization of the field, path of the beam, time of the pulse and more. One polarization state can be the logical zero state and the other polarization state the logical one, or a beam can take two possible paths labeled zero and one. Alternatively the pulse can be created early to make a zero or late to make a one. In this way, the state of the light field can encode a bit, and a quantum field can encode a superposition of zeros and ones, hence encode quantum information. The electromagnetic field can be processed with passive optical elements, linear and parametric amplifiers, nonlinear phase modulations and photon counting with feedback to enable universal transformations of the field state. In this way, a quantum computer can be realized with light by exploiting one or more of light s degrees of freedom.

5 338 B. Sanders Electronic states of atoms provide another promising quantum information medium. A lower energy state can be a zero and an upper energy state a one, with other energy levels available for helping to prepare, control and read the state. The atoms can be neutral or ionized, with each case offering its own advantages and disadvantages. The electronic state can even be coupled with the nuclear state to take advantage of the long nuclear lifetimes for storage and memory [ 6 ]. Each approach and each medium has advantages and disadvantages. One medium may be better at storage, another better at effecting quantum gates and another better at readout. At this stage of research, we do not know which media will be winners and which will be losers. More investigation is required Hybridizing the Technology We will probably find it easier not to overcome the disadvantages of one medium but, rather, combine several media to take advantage of the positives and avoid the negatives. To make such a hybrid device we need to transfer quantum information between media at opportune times. As mentioned above, coupling the electronic and nuclear degrees of freedom enables the quantum computer to exploit the advantages of both degrees of freedom. We can generalize this idea of combining the advantages of various media. For example we could couple electronic and light degrees of freedom, which presents the advantage that light is the favored medium for communicating long distances and electrons are natural quantum information media in solid-state systems so may work well with existing computer chips. Another exciting possibility is using superconducting junctions in conjunction with microwave fields and using molecules to couple microwave and optical fields together to deliver scalable quantum information processing [ 7 ] Scaling Up The goal of scalability is to make a quantum computer work on a small scale dozens of qubits and dozens of gate operations and then to increase the size and number of operations efficiently. By efficiently the increasing size and complexity should come at a cost that is no worse than a polynomial function of the size of the problem to be solved. This mathematical characterization of efficiency is germane to the computer science notions of efficient vs hard problems. Although quantum computer technology is improving steadily, we are still wrestling with getting small systems to work. Fortunately we do not have to make quantum computers as big as today s computers to make quantum computers outperform today s computers. For example, it might take the storage capacity of thousands of laptops in a network to break existing encryption algorithms in a few years, whereas

6 36 Quantum Cryptography 339 storage capacity of only a 100 quantum kilobytes would break existing encryption algorithm in less than a second. In a similar vein, a laptop computer operates at gigahertz speeds that completes billions of operations per second, but the quantum computer could operate as fast and complete the calculation in a few thousand cycles, namely in a millionth of a second. The important message is that, for certain problems, a quantum computer is so powerful that even a small prototype is more threatening to information security than combining thousands of the most powerful computers in existence today, if we continue to use the same means for encryption Quantum Cryptography to the Rescue The quantum computer dashes our hope of information security using existing encryption schemes, but two alternatives restore this hope: new encryption schemes or using quantum cryptography [ 8 ]. Here we consider the second possibility, especially as the technology is viable now whereas quantum computing is still a futuristic technology Encryption Mechanism Existing public-key encryption works by having sender Alice transmit to receiver Bob a public key and keeping her own private key. The goal of quantum key distribution is to have Alice and Bob generate an identical key: at the end of the generation process, Alice and Bob would each hold identical strings of bits using a public channel in such a way that omnipotent Eve is denied enough knowledge of this key so that she is incapable of learning anything about the messages encoded by this key using a one-time pad. Secret keys used with one-time pads are informationtheoretically secure. Sounds impossible? The uncertainty principle [ 3 ] traps Eve: if she wants to learn the shared random keys, her observation disturbs the system, and Alice and Bob can learn of her intrusion before they make the mistake of using the key to construct messages. Alice and Bob discuss publicly the noise in their keys and use a technique known as privacy amplification to circumvent Eve from using a little knowledge to crack the codes. There are four important catches though. One is that Alice and Bob need to authenticate the channel in advance; otherwise Eve could impersonate them. So far the only information-theoretically secure way to authenticate is to use a private channel. As information-theoretically secure authentication through a public channel has not been achieved, quantum key distribution is actually a key amplification scheme whereby the initial authentication key is amplified, but here we use the standard terminology of distribution rather than amplification and bear in mind the authentication problem.

7 340 B. Sanders The second catch is that Eve could just disrupt the communication by a denial-of-service attack whereby Alice and Bob do not have a working communication channel: Alice and Bob do not reveal their secrets but unfortunately also fail to communicate secrets with each other. Thus, security is maintained at the expense of not communicating at all. The third catch is that current quantum key distribution technology is limited to distances of hundreds of kilometers. In principle, efficient quantum communication over any length scale is possible using quantum repeaters, but quantum repeaters are almost as hard to build as quantum computers. The fourth catch is that equipment does not work perfectly, and Eve may know weaknesses that Alice and Bob do not. She thereby exploits a hidden weakness to learn the key without Alice and Bob realizing that weakness is exploited. Recently, though, entanglement-based quantum key distribution has been shown to offer another stunning advantage. Alice and Bob can check quantum correlations between their received quantum signals and thereby rule out attacks based on imperfect devices [9 ]. This kind of device-independent security is not possible in non-quantum cryptography State of the Art Quantum key distribution works and is even available as a commercial technology, but its performance is not yet competitive with other key distribution technologies. This statement needs some qualification, though. If existing key distribution is regarded as insecure, for any of the reasons given in Sect. 36.1, then even a poorly-performing but secure quantum key distribution system is infinitely better than a better-performing but insecure key distribution based on today s computationally-secure protocols. However, quantum key distribution needs to reach comparable levels of performance to existing schemes, i.e. achieve high levels of key generation rates, if quantum key distribution is to be regarded as viable in the sense that it can step in and replace existing key distributions with a small price to pay in terms of secure-bit distribution rates. Due to loss, the key generation rate is sensitive to distance. Let us consider a 10-km distance, commensurate with urban-scale security. A rate of two million pulses of light generated per second is reasonable. For security, the average energy per pulse corresponds to one photon per five pulses. Yes, this means that most pulses are effectively empty (no energy), but which ones are empty is random. Avalanche photodiodes are typically used as detectors, although better detectors are on the horizon. These photodiodes operate with a quantum efficiency of 0.1, a dark-count probability of and a gate time of 2 ns. The gate time is not reducible without causing deleterious after-pulses. With this technology, and after

8 36 Quantum Cryptography 341 sifting, error correction, privacy amplification and authentication of the raw key, the resultant key rate is around 10 khz. This rate of 10 khz is significantly slower than existing key distribution rates but can be dramatically improved by new detector technology and eventually faster software and integrating the processors on a single chip. New protocols and faster encoding on the pulses will also help to enhance performance Symmetric Encryption For quantum key distribution to deliver information-theoretic security that is impervious to non-quantum computational attacks, the key should be employed in a Vernam cipher, or one-time pad. In practice, the Vernam cipher is off-putting because the length of the shared key needs to be as long as the message. In practice, the key is used much more efficiently when employed in a symmetric encryption scheme such as the Advanced Encryption Standard, or AES, based on a substitution permutation network. As this method of encryption can be broken, the key is changed frequently; this is known as refreshing the key. Quantum key distribution can be used to generate the key for AES. Then the key rate is important because the length of the key per refresh and the rate of refreshing determines the level of communication security attained Long Distance Because of losses of light during transmission, the secure key rate falls precipitously with increasing distance. Rather than send through optical fiber or free space over the earth, an alternative method is to use satellites to communicate. The great advantage of satellites is their long reach, on a planetary scale, without too much intervening air, which induces losses and scattering of the light. The effective distances, taking into account air density, is much shorter for satellite communication than for over-earth communication although the actual distances can be much larger. Another strategy to beat the distance limit is to plug in quantum repeaters [ 10 ] along the path. Quantum repeaters are much harder to make than existing repeaters used in communication networks. The quantum repeater exploits entanglementswapping processing of the resultant quantum states to deliver a fixed key rate at a cost that is only a polynomial function of overall distance, hence efficient in computer-science parlance. Much effort is now directed to quantum memories [ 11 ], which will store and release quantum states on demand, and are required for managing a quantum communication network with quantum repeaters.

9 342 B. Sanders 36.4 Conclusions Quantum cryptography is a rapidly developing technology that aims to deliver information-theoretically secure communication. In other words, quantum cryptography s goal is to circumvent the weakness of today s methods: an adversary with a sufficiently strong computer, obtained by recording and breaking the code in the future or by possessing a computer more powerful than envisaged or by building a quantum computer, could break the code. Quantum cryptography would eliminate the computational bound assumption built into today s belief in security. Development of a quantum computer is slow but steady. Challenges exist in each of the candidate media for realizing quantum computation, but clever ways are being found to surmount the challenges such as hybridizing the media. Hybridization enables quantum information to be prepared or processed or read in various media depending on their strengths and transferred to another medium that is more suitable for one of the tasks. The outlook for quantum computing would be described as optimistic, but patience is required. Quantum cryptography is a prudent tool to protect against quantum computing. Although the quantum computer will take a long time to build, quantum cryptography also requires a long time to bring its performance up to today s standards for non-quantum key distribution, including high key rates, developing an appropriate authentication protocol, and breaking the current distance barrier. Therefore, quantum cryptography needs to be studied and developed as a long-term strategic effort to protect communication against future communication-security threats. Acknowledgements BCS has benefitted enormously from valuable discussions with W. Tittel and pedagogical feedback from L. Moore. This work is supported by Alberta s Informatics Circle of Research Excellence ( i CORE), Canada s Natural Science and Engineering Research Council (NSERC), General Dynamics Canada, Canada s Networks of Centers of Excellence for the Mathematics of Information Technology and Complex Systems (MITACS), the Pacific Institute for Mathematical Sciences (PIMS), and the United States Army Research Office (ARO). BCS is a Fellow of the Canadian Institute for Advanced Research (CIFAR). References 1. Knill E (2010) Physics: quantum computing. Nature 463: Bartlett SD, Sanders BC (2003) Requirement for quantum computation. J Mod Opt 50(15 17): Heisenberg W (1927) Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Zeitschrift für Phys 43: English translation; Wheeler JA, Zurek H (1983) Quantum theory and measurement. Princeton University Press, Princeton, pp Schrödinger E (1935) Discussion of probability relations between separated systems. Proc Camb Philos Soc 31: ; (1936) 32: O Brien JL (2007) Optical quantum computing. Science 318(5856): Childress L, Gurudev Dutt MV, Taylor JM, Zibrov AS, Jelezko F, Wrachtrup J, Hemmer PR, Lukin MD (2006) Coherent dynamics of coupled electron and nuclear spin qubits in diamond. Science 314(5797):

10 36 Quantum Cryptography André A, DeMille D, Doyle JM, Lukin MD, Maxwell SE, Rabl P, Schoelkopf RJ, Zoller P (2006) A coherent all-electrical interface between polar molecules and mesoscopic superconducting resonators. Nat Phys 2: Gisin N, Ribordy G, Tittel W, Zbinden H (2002) Quantum cryptography. Rev Mod Phys 74(1): doi:dx.doi.org 9. Acin A, Brunner N, Gisin N, Massar S, Pironio S, Scarani V (2007) Device-independent security of quantum cryptography against collective attacks. Phys Rev Lett 98: Briegel HJ, Dür W, Cirac JI, Zoller P (1998) Quantum repeaters: the role of imperfect local operations in quantum communication. Phys Rev Lett 81: Lvovsky AI, Sanders BC, Tittel W (2009) Quantum optical memory. Nat Photonics 3(12):

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based

More information

The New Approach of Quantum Cryptography in Network Security

The New Approach of Quantum Cryptography in Network Security The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,

More information

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso encisomo@in.tum.de Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Towards a Tight Finite Key Analysis for BB84

Towards a Tight Finite Key Analysis for BB84 The Uncertainty Relation for Smooth Entropies joint work with Charles Ci Wen Lim, Nicolas Gisin and Renato Renner Institute for Theoretical Physics, ETH Zurich Group of Applied Physics, University of Geneva

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

QUANTUM LIGHT :! A BRIEF INTRODUCTION!

QUANTUM LIGHT :! A BRIEF INTRODUCTION! Quantum Physics QUANTUM LIGHT : A BRIEF INTRODUCTION Philippe Grangier Laboratoire Charles Fabry de l'institut d'optique, UMR 85 du CNRS, 927 Palaiseau, France Quantum Physics * Alain Aspect, in «Demain

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science

More information

SFWR ENG 4C03 - Computer Networks & Computer Security

SFWR ENG 4C03 - Computer Networks & Computer Security KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,

More information

A High Speed Quantum Communication Testbed

A High Speed Quantum Communication Testbed A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward

More information

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)

More information

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g. Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:

More information

Quantum control of individual electron and nuclear spins in diamond lattice

Quantum control of individual electron and nuclear spins in diamond lattice Quantum control of individual electron and nuclear spins in diamond lattice Mikhail Lukin Physics Department, Harvard University Collaborators: L.Childress, M.Gurudev Dutt, J.Taylor, D.Chang, L.Jiang,A.Zibrov

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

1 Message Authentication

1 Message Authentication Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions

More information

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

A Probabilistic Quantum Key Transfer Protocol

A Probabilistic Quantum Key Transfer Protocol A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: aparakh@unomaha.edu August 9, 01

More information

Quantum cryptography

Quantum cryptography Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2

More information

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; bob@bastille.io HitB; 28 May 2015

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; bob@bastille.io HitB; 28 May 2015 Privacy and Security in the Internet of Things: Theory and Practice Bob Baxley; bob@bastille.io HitB; 28 May 2015 Internet of Things (IoT) THE PROBLEM By 2020 50 BILLION DEVICES NO SECURITY! OSI Stack

More information

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

Introduction To Security and Privacy Einführung in die IT-Sicherheit I Introduction To Security and Privacy Einführung in die IT-Sicherheit I Prof. Dr. rer. nat. Doğan Kesdoğan Institut für Wirtschaftsinformatik kesdogan@fb5.uni-siegen.de http://www.uni-siegen.de/fb5/itsec/

More information

Introduction. Digital Signature

Introduction. Digital Signature Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology

More information

Quantum Safe Cryptography V1.0.0 (2014-10)

Quantum Safe Cryptography V1.0.0 (2014-10) White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily

More information

Quantum Computing and Cryptography Their impact on cryptographic practice

Quantum Computing and Cryptography Their impact on cryptographic practice Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is

More information

Authentic Digital Signature Based on Quantum Correlation

Authentic Digital Signature Based on Quantum Correlation Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital

More information

One Time Pad Encryption The unbreakable encryption method

One Time Pad Encryption The unbreakable encryption method One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Cryptography & Digital Signatures

Cryptography & Digital Signatures Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

Enhancing privacy with quantum networks

Enhancing privacy with quantum networks Enhancing privacy with quantum networks P. Mateus N. Paunković J. Rodrigues A. Souto SQIG- Instituto de Telecomunicações and DM - Instituto Superior Técnico - Universidade de Lisboa Abstract Using quantum

More information

Quantum Computing for Beginners: Building Qubits

Quantum Computing for Beginners: Building Qubits Quantum Computing for Beginners: Building Qubits Suzanne Gildert Condensed Matter Physics Research (Quantum Devices Group) University of Birmingham 28/03/2007 Overview of this presentation What is a Qubit?

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP

More information

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India sd_patil057@rediffmail.com Modern College of Engineering,

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio

Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Review Key Citations Web Sites Glossary Conferences Editor Review Article 1. Cryptography - an Overview I

More information

Introduction to Encryption

Introduction to Encryption Computers and Society Introduction to Encryption Chris Brooks Department of Computer Science University of San Francisco Department of Computer Science University of San Francisco p.1/35 3-0: Terminology

More information

"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it

in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta. h is the Planck constant he called it 1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Quantum Safe Cryptography and Security

Quantum Safe Cryptography and Security ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)

More information

Practical Covert Channel Implementation through a Timed Mix-Firewall

Practical Covert Channel Implementation through a Timed Mix-Firewall Practical Covert Channel Implementation through a Timed Mix-Firewall Richard E. Newman 1 and Ira S. Moskowitz 2 1 Dept. of CISE, PO Box 116120 University of Florida, Gainesville, FL 32611-6120 nemo@cise.ufl.edu

More information

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Princeton University Computer Science COS 432: Information Security (Fall 2013) Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

1 Construction of CCA-secure encryption

1 Construction of CCA-secure encryption CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.

More information

Module 7 Security CS655! 7-1!

Module 7 Security CS655! 7-1! Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz Quantum Algorithms in NMR Experiments 25 th May 2012 Ling LIN & Michael Loretz Contents 1. Introduction 2. Shor s algorithm 3. NMR quantum computer Nuclear spin qubits in a molecule NMR principles 4. Implementing

More information

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK

SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK SAMPLE EXAM QUESTIONS MODULE EE5552 NETWORK SECURITY AND ENCRYPTION September 2010 (reviewed September 2014) ECE, SCHOOL OF ENGINEERING AND DESIGN BRUNEL UNIVERSITY UXBRIDGE MIDDLESEX, UK NETWORK SECURITY

More information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public

More information

On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments

On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments Suman Jana, Sriram Nandha Premnath Mike Clark, Sneha K. Kasera, Neal Patwari University of Utah Srikanth

More information

Whitenoise Security as a Service

Whitenoise Security as a Service Whitenoise Security as a Service Whitenoise Security as Service uses distributed keys to provide secure network access with dynamic, continuous, onetime-pad (password) authentication throughout a network

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

Royal Holloway Series 2011

Royal Holloway Series 2011 Quantum key distribution: Awesome or pointless? Some believe the advent of quantum computing will reduce the time taken to solve cryptographic algorithms so dramatically that they will no longer provide

More information

Network Security. HIT Shimrit Tzur-David

Network Security. HIT Shimrit Tzur-David Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

Monday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK

Monday January 19th 2015 Title: Transmathematics - a survey of recent results on division by zero Facilitator: TheNumberNullity / James Anderson, UK Monday January 19th 2015 Title: "Transmathematics - a survey of recent results on division by zero" Facilitator: TheNumberNullity / James Anderson, UK It has been my pleasure to give two presentations

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Key Agreement from Close Secrets over Unsecured Channels Winter 2010

Key Agreement from Close Secrets over Unsecured Channels Winter 2010 Key Agreement from Close Secrets over Unsecured Channels Winter 2010 Andreas Keller Contens 1. Motivation 2. Introduction 3. Building Blocks 4. Protocol Extractor Secure Sketches (MAC) message authentication

More information

How To Understand And Understand The History Of Cryptography

How To Understand And Understand The History Of Cryptography CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 1: Introduction Ion Petre Department of IT, Åbo Akademi University January 10, 2012 1 Motto Unfortunately, the technical

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Developing and Investigation of a New Technique Combining Message Authentication and Encryption Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.

More information

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet

More information

Practical security of quantum cryptography

Practical security of quantum cryptography Lars Vincent van de Wiel Lydersen Practical security of quantum cryptography Thesis for the degree of Philosophiae Doctor Trondheim, September 2011 Norwegian University of Science and Technology Faculty

More information

E- Encryption in Unix

E- Encryption in Unix UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 537 A. Arpaci-Dusseau Intro to Operating Systems Spring 2000 Security Solutions and Encryption Questions answered in these notes: How does

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

The Role of Electric Polarization in Nonlinear optics

The Role of Electric Polarization in Nonlinear optics The Role of Electric Polarization in Nonlinear optics Sumith Doluweera Department of Physics University of Cincinnati Cincinnati, Ohio 45221 Abstract Nonlinear optics became a very active field of research

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Module 8. Network Security. Version 2 CSE IIT, Kharagpur Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May

More information

SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper

SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications A TCS Space & Component Technology White Paper Introduction As with most storage technologies, NAND Flash vendors

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Key Distillation Process on Quantum Cryptography Protocols in

More information